Hacking has been all over the news lately. In the past week or so, major global corporations Apple, Burger King and Jeep, as well as customer service technology vendor Zendesk, have all been hacked — to say nothing of apparent intrusions into systems governing the country’s infrastructure by the Chinese military.
Let’s take a look at exactly what has been happening in the world of high-profile hacking in recent days, starting with Apple.
Apple - Lights Out for Java?
Apple employees visiting a site for iPhone developers that was apparently infected with Java-based malware that also caused a cybersecurity breach at Facebook in January had their corporate Macs hacked. As reported by Computerworld, Apple resolved the situation by issuing a Java for OS X 2013-001 1.0 update.
However, Computerworld says many experts are urging users of any platform (and this specific malware reportedly targeted Macs) to simply “shut off Java.” Java is said to pose unique risks as a cross-platform application and Cisco has estimated 80 percent of cyberattacks exploit Java vulnerabilities, with online ads being a major culprit. Apple’s latest Java update actually disables the Java SE 6 applet plug-in, which Computerworld says is tantamount to Apple abandoning Java.
Burger King, Jeep Discover the Dark Side of Social
While brands are exhorted to “be social” and maintain an active presence on leading consumer social networks such as Twitter, this week Burger King there is a dark side to social branding.
An Econsultancy blog post reports that hackers who were possibly (but as of yet not publicly confirmed to be) affiliated with the global hacker organization Anonymous broke into Burger King’s Twitter account, changed the name and image to that of chief Burger King rival McDonald’s, and spent an hour sending out images and comments hurtful to the fast food chain’s brand.
Econsultancy essentially gives Burger King a pass as far as allowing this to actually occur, since groups such as Anonymous are capable of defeating the cyber security efforts of world governments, but rebukes the company for only sending out a single tweet obliquely referring to an “interesting day” once the hack was fixed and planning to apologize publicly on Facebook, rather than Twitter.
The post also advises Twitter to take additional steps, such as two-step authentication, to protect corporate clients and reminds companies to use basic anti-hacking precautions such as constantly monitoring social media accounts, using passwords that cannot easily be guessed, avoiding third-party apps and limiting authorized access.
Jeep was victimized by a similar Twitter hack a couple of days before the Burger King hack, with its page switched to promote Cadillac and a series of tweets confessing to purported drug use by Jeep executives and containing racial epithets being sent out. CNBC reports that Cadillac quickly denied any involvement and Jeep quickly regained control of the account.
Speculation for this hack has also focused on Anonymous as well as the hack group LulzSec, but Gizmodo reports that a New England DJ with a juvenile history of sophisticated hacking may actually be to blame.
Zendesk Support Info Hacked
In a less high-profile but still significant case, customer support technology vendor Zendesk publicly announced on its site yesterday that earlier this week, a hacker gained access to its system and downloaded support information of three customers.
Zendesk has since patched the vulnerability and ended the hacker’s access, but the company believes customer email addresses and support email subject lines were stolen and is helping the customers respond. This attack is a reminder that hackers do not limit themselves to major public attacks on multibillion dollar global enterprises.
- IDC: 10 Predictions For Emerging Technologies In 2015
- What's Next for Big Data? Predictions for 2015
- Are You Too Old to Work in Tech? IT's Midlife Crisis
- Honest-to-God, Absolutely True Marketing Predictions for 2015
- 2015 Forecast: The Sun is Out for Cloud Computing
- 8 Components of a Truly Integrated Digital Workplace
- 6 C's for More Efficient IT In 2015 [Infographic]